General

  • Target

    0b7669696883c3a853a6d06d3adafa79a2236baef0d448bffd1ac8574dcb64cc

  • Size

    318KB

  • Sample

    221127-qlgfqsag44

  • MD5

    d71366f5eece0973d076ecb08e4894b4

  • SHA1

    5192fea16a9f8244d2e6a4eaaf87655cecd1f13f

  • SHA256

    0b7669696883c3a853a6d06d3adafa79a2236baef0d448bffd1ac8574dcb64cc

  • SHA512

    3e00aaebe6d2c85c0ed0c4b1989bc3b2390c367aa4226758b5c8d3dee064e8003efacfdf10001752bb5578e2b431676e34eef80e8ad03edb3e3cdea2b56936dc

  • SSDEEP

    6144:Ji3GW+lMXFj7cttK3JnSjTIJB6Jeht3h/dSYOY4IpQOvG8f1RRO:sl+c57c/KdWTIJ4JehttX7QOvHf

Malware Config

Targets

    • Target

      0b7669696883c3a853a6d06d3adafa79a2236baef0d448bffd1ac8574dcb64cc

    • Size

      318KB

    • MD5

      d71366f5eece0973d076ecb08e4894b4

    • SHA1

      5192fea16a9f8244d2e6a4eaaf87655cecd1f13f

    • SHA256

      0b7669696883c3a853a6d06d3adafa79a2236baef0d448bffd1ac8574dcb64cc

    • SHA512

      3e00aaebe6d2c85c0ed0c4b1989bc3b2390c367aa4226758b5c8d3dee064e8003efacfdf10001752bb5578e2b431676e34eef80e8ad03edb3e3cdea2b56936dc

    • SSDEEP

      6144:Ji3GW+lMXFj7cttK3JnSjTIJB6Jeht3h/dSYOY4IpQOvG8f1RRO:sl+c57c/KdWTIJ4JehttX7QOvHf

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks